9-26
Configuring and Monitoring Port Security
MAC Lockout
How It Works.
Let’s say a customer knows there are unauthorized wireless
clients who should not have access to the network. The network administrator
“locks out” the MAC addresses for the wireless clients by using the MAC
Lockout command (
lockout-mac <
mac-address
>
). When the wireless clients
then attempt to use the network, the switch recognizes the intruding MAC
addresses and prevents them from sending or receiving data on that network.
If a particular MAC address can be identified as unwanted on the switch then
that MAC Address can be disallowed on all ports on that switch with a single
command. You don’t have to configure every single port—just perform the
command on the switch and it is effective for all ports.
MAC Lockout overrides MAC Lockdown, port security, and 802.1X authenti-
cation.
You cannot use MAC Lockout to lock:
•
Broadcast or Multicast Addresses (Switches do not learn these)
•
Switch Agents (The switch’s own MAC Address)
If someone using a locked out MAC address tries to send data through the
switch a message is generated in the log file:
Lockout logging format:
W 10/30/03 21:35:15 maclock: module A: 0001e6-1f96c0 detected
on port A15
W 10/30/03 21:35:18 maclock: module A: 0001e6-1f96c0 detected
on port A15
W 10/30/03 21:35:18 maclock: module A: Ceasing lock-out logs
for 5m
As with MAC Lockdown a rate limiting algorithm is used on the log file so that
it does not become overclogged with error messages. (Refer to “Limiting the
Frequency of Log Messages” on page 9-21.)
Displaying status.
Locked out ports are listed in the output of the
show
running-config
command in the CLI. The
show lockout-mac
command also lists
the locked out MAC addresses, as shown below.
Summary of Contents for ProCurve 2510-24
Page 1: ...Access Security Guide 2510 www procurve com ProCurve Switches Q 11 XX 2510 24 U 11 XX 2510 48 ...
Page 2: ......
Page 3: ...ProCurve Series 2510 Switches Access Security Guide July 2008 ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 104: ...4 30 TACACS Authentication Configuring TACACS on the Switch ...
Page 144: ...5 40 RADIUS Authentication Authorization and Accounting Messages Related to RADIUS Operation ...
Page 174: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 196: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 294: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 308: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 316: ...8 Index ...
Page 317: ......